Ransomware Hits Tankstar USA Lynx Group Takes Responsibility

Incident Date:

October 9, 2024

World map

Overview

Title

Ransomware Hits Tankstar USA Lynx Group Takes Responsibility

Victim

Tankstar

Attacker

Lynx

Location

Milwaukee, USA

Wisconsin, USA

First Reported

October 9, 2024

Ransomware Attack on Tankstar: Lynx Group Claims Responsibility

Tankstar USA, Inc., a prominent player in the transportation sector, has recently fallen victim to a ransomware attack orchestrated by the cybercriminal group known as Lynx. This incident highlights the vulnerabilities faced by companies in the logistics industry and underscores the persistent threat posed by sophisticated ransomware groups.

About Tankstar USA, Inc.

Founded in 1913 and headquartered in Milwaukee, Wisconsin, Tankstar USA, Inc. operates as a holding company for a network of independently run trucking and logistics firms. Specializing in the transportation of bulk commodities, particularly liquid chemicals and dry bulk materials, Tankstar has established itself as a significant player in the truck transportation and freight logistics sector. With a workforce of approximately 96 to 130 employees, the company generates an annual revenue of around $32.7 million. Tankstar is known for its commitment to safety and efficiency, emphasizing the importance of hiring experienced drivers and fostering a supportive work environment.

Details of the Ransomware Attack

The ransomware attack on Tankstar has resulted in the compromise of a substantial volume of data, indicating a significant breach of the company's information security protocols. While the specific nature of the data affected has not been disclosed, the volume suggests that critical operational or customer information may have been involved. Lynx, known for their sophisticated encryption techniques, typically demands a ransom in exchange for the decryption key, putting Tankstar in a precarious position as they assess the potential impact on their operations and data integrity.

Profile of the Lynx Ransomware Group

Lynx ransomware, first reported in July 2024, has quickly made its mark as a formidable cyber threat, attacking over 22 organizations mostly across the manufacturing and construction industries. Operating under a Ransomware-as-a-Service (RaaS) model, Lynx combines single and double extortion tactics, encrypting files while also exfiltrating sensitive data. The group primarily targets Windows systems, appending a .lynx extension to encrypted files while deleting shadow copies to hinder recovery. Despite claiming an "ethical" approach by avoiding attacks on government, healthcare, and non-profit organizations, Lynx’s operations have shown a clear intent to cause maximum disruption.

Potential Vulnerabilities and Entry Points

Tankstar's reliance on technology for logistics management and operational oversight may have presented vulnerabilities that Lynx exploited. The ransomware group employs phishing and malicious downloads as primary infection vectors, ensuring a wide range of entry points into victim environments. This attack serves as a stark reminder of the importance of effective cybersecurity measures in protecting sensitive data and maintaining operational integrity.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.